• Home
  • Webinars
  • Knowledge Partners
  • Experts
  • Become a Knowledge Partner
  • About
  • Contact
  • Webinars
  • Knowledge Partners
  • Experts
  • About
  • Contact

Home > Keynotes > Cyber Security > Page 3

Cyber Security

Android Automotive security assurance in a factory model

June 7, 2022
Connected VehiclesCyber SecurityIn-Vehicle InfotainmentSoftwareTesting and Validation

Sasken’s Narasimha Bashyam and Debashis Panigrahi explain how to stay on top of Android security releases to maintain customer loyalty.

The role of virtualization in connected vehicle infotainment systems

May 10, 2022
Connected VehiclesCyber SecurityIn-Vehicle InfotainmentSoftwareWireless Networks

Tero Salminen of OpenSynergy explains how virtualizing a single function increases connected vehicle systems security and makes updating and upgrading software components much more straightforward.

Scaling V2X deployments securely and reliably for autonomy

May 5, 2022
Autonomous VehiclesCyber SecurityDataMarket ForecastsSoftwareVehicle SafetyWireless Networks

Sasken’s Vasudevan Mukundan and Debashis Panigrahi discuss a cloud-native framework that could scale V2X deployments reliably and securely, reducing cost and time-to-market.

How to manage secure resource sharing on next-generation E/E architectures

May 5, 2022
Connected VehiclesCyber SecurityE/E ArchitectureSoftware

Andrew Coombes and Rohan Pandit of ETAS present a use case of integrating an HSM into a microcontroller hypervisor system.

How to achieve fast, flexible, and secure in-vehicle communication for next-generation vehicles

April 20, 2022
Connected VehiclesCyber SecurityDataE/E ArchitectureSoftwareWireless Networks

Elektrobit’s Illia Safiulin provides unique insight into the demands on software solutions needed for new zonal architectures in connected vehicles.

A lifecycle approach to vehicle cybersecurity in days of supply chain shortages

April 6, 2022
Connected VehiclesCyber SecurityDataSoftwareStandards and Regulations

AVL’s Harald Petschnik and Guy Gilam of Cybellum explore the impact of cybersecurity trends on the automotive ecosystem.

Staying ahead of hackers with an adaptable, multi-network vehicle intrusion detection system

March 31, 2022
Connected VehiclesCyber SecurityDataE/E ArchitectureSoftwareWireless Networks

Garrett’s Stephane Strahm and Cavy Pan present an IDS software that integrates multi-network and application processor detection-isolation-report-response algorithms.

How to build an automotive cybersecurity incident response team

February 16, 2022
Connected VehiclesCyber SecurityDataStandards and Regulations

ESCRYPT’s Dr Moritz Minzlaff and Dr Carolina Adaros of Robert Bosch explain how to build an automotive cybersecurity incident response team.

Automotive fuzzing: unmasking hidden security risks

December 14, 2021
Connected VehiclesCyber SecuritySoftwareTesting and Validation

ESCRYPT experts Joe Cusumano and John McShane discuss automotive-specific fuzzing, a robust testing technique that unmasks hidden security risks in automotive systems.

Future trends in HSM-driven automotive cybersecurity

December 9, 2021
Connected VehiclesCyber SecurityDataE/E ArchitectureMarket ForecastsSoftware

ESCRYPT’s Rohan Pandit and Suraj Ramachandrappa discuss future market trends and requirements regarding the HSM in the automotive cybersecurity domain towards next-generation vehicle E/E architectures.

Tying WP.29 cybersecurity requirements to mitigation verification testing

November 23, 2021
Connected VehiclesCyber SecurityDataSoftwareStandards and RegulationsTesting and ValidationWireless Networks

Thomas Leifert of Keysight Technologies explains how UNECE WP.29 UN R155 relates to ISO/SAE 21434, the implications to the automotive industry, and how a successful implementation might look.

Cybersecurity challenges and solutions for implementing UN R155 and ISO/SAE 21434

November 23, 2021
Connected VehiclesCyber SecurityDataSoftwareStandards and RegulationsTesting and Validation

Paul Wooderson of HORIBA MIRA discusses cybersecurity challenges and solutions when implementing the requirements of the new UNECE Regulation 155 and international standard ISO/SAE 21434.

Using digital twins for automated automotive cybersecurity testing

November 22, 2021
Connected VehiclesCyber SecurityDataSoftwareTesting and Validation

AVL’s Stefan Marksteiner and Cybellum’s Eyal Traitel explain how cyber digital twins can be automatically derived from automotive components and subsequently used to formulate security tests that verify their cybersecurity.

ECU design for functional safety, cybersecurity, and AUTOSAR™ compliance

November 17, 2021
Connected VehiclesCyber SecuritySoftwareStandards and RegulationsVehicle Safety

NXP experts explain why designing ECUs for functional safety, cybersecurity, and AUTOSAR compliance requires an understanding of the embedded hardware and software components available for implementation.

From in-vehicle intrusion detection to responsive attack prevention

November 12, 2021
Connected VehiclesCyber SecurityDataE/E ArchitectureSensorsSoftwareStandards and RegulationsWireless Networks

ESCRYPT’s Siddharth Shukla and Andreas Weber discuss different cyber attack prevention techniques and how to combine them with IDS sensors to protect the vehicle E/E architecture.

VSOC – cloud-based vehicle fleet security monitoring and response

October 28, 2021
Connected VehiclesCyber SecurityDataFleetsSoftwareStandards and Regulations

Experts from ESCRYPT explain why it is essential to use a combination of automated SIEM and human expert teams for fleet security monitoring.

Chinese automotive security regulations: how to build an integrated cybersecurity management system

October 18, 2021
Connected VehiclesCyber SecurityDataSoftwareStandards and RegulationsTesting and Validation

Experts from ESCRYPT provide unique insight into automotive security regulations and standards in China, including MIIT’s critical upcoming regulation.

IDPS: a distributed system for cyber-attack detection and prevention in vehicles

October 12, 2021
Connected VehiclesCyber SecurityDataE/E ArchitectureSensorsSoftwareStandards and Regulations

ESCRYPT’s Jan Holle and Andreas Weber explain why distributed E/E architectures require a distributed IDPS that maps the specific protection needs of the vehicle systems.

A practical guide to fuzz testing embedded software in a CI pipeline

October 7, 2021
Connected VehiclesCyber SecurityDataPerception SystemsSensorsSoftwareTesting and ValidationWireless Networks

Dr. Dennis Kengo Oka outlines a practical step by step guide to building fuzz testing into the CI pipeline using the Zephyr Project RTOS as an example.

Applying real-world pen test lessons to UN-R155 cyber security compliance

September 14, 2021
Connected VehiclesCyber SecurityDataSoftwareStandards and RegulationsTesting and Validation

SBD Automotive’s Jitesh Joshy and David McClure reveal how true success comes from marrying real-world pen test findings, deep threat modelling expertise, and insight into competitor adoption trends.

  1. ←
  2. 1
  3. 2
  4. 3
  5. 4
  6. 5
  7. →
  1. ←
  2. 1
  3. 2
  4. 3
  5. 4
  6. 5
  7. →
Mobex by Automotive World
1 – 3 The Washington Building
Stanwell Road
Penarth CF64 2AD
United Kingdom

Sign up for emails and never miss a webinar. Opt out or change your preferences at any time.

© Automotive World Ltd 2022. All rights reserved.

  • Become a Knowledge Partner
  • Terms and Conditions
  • Privacy Policy

Create a free account to view all
webinar videos and slide decks

Already have a Mobex account? .

* Required field

Hidden
Hidden

Which future mobility topics interest you most?

Which future mobility topics interest you most?

*
I want to receive emails regarding upcoming Mobex webinars.
I want to receive informative emails from third party Knowledge Partners whose presentations I view on this site.
This field is for validation purposes and should be left unchanged.

Log in to your account

Forgot password